identity theft

Kaspersky 2013 ups the ante with exploit prevention

The 2013 updates to the Kaspersky protection suites bring to consumers some of the most advanced security technology currently available. It involves introducing an exploit prevention engine as part of the security suite, but also a Safe Money banking protection tool that you can interact directly with. The suite's scans aren't the fastest, but it definitely will protect you.

Installation Installing Kaspersky has been dramatically simplified over the past two years. Following on 2012's fuss-free install, the installer for 2013 will remove conflicting security programs and any detected malware automatically.

You're still on the hook for … Read more

Make yourself less vulnerable online (video)

Zappos, LinkedIn, eHarmony, Yahoo, LastFm, the Environmental Protection Agency, Stanford, and Columbia University -- all suffered online data breaches recently, says the Privacy Rights Clearinghouse.

In fact, this year alone, there have been 276 data breaches, according to the Identity Theft Resource Center. Statistics indicate that private sector businesses and the health-care industry were most vulnerable, falling victim to, respectively, 37 percent and 34 percent of the breaches. Educational institutions and the government/military sector had breach rates of 14 percent and 11 percent, respectively. The rate for financial companies came in at just more than 3 percent, according to … Read more

California unveils new unit to fight cybercrime

Along with being home to Silicon Valley, California is also an epicenter of cybercrime.

That led California Attorney General Kamala Harris to announce today the creation of a new state Justice Department unit to combat crimes that enlist technology.

The eCrime unit aims to "make sure that vulnerable populations are safe, that consumers are safe, and that we allow good behavior to occur," Harris said at a news conference in San Jose, Calif (see video of news conference below). "But where there are predators and predatory practices, we want to ensure we have the skills and technology … Read more

How to know when your private data is lost or stolen

You're responsible for securing the private information you store on your computer or transmit over the Internet. But what about your personal data that's in the hands of some organization you've trusted with it?

From the IRS to your local florist, your private information is widely shared. And every day some organization loses sensitive data about its clients or customers--whether due to a hack attack or (more likely) from the loss or theft of a computer or storage device.

Here are three recent examples from the Open Security Foundation's Data Loss Database:

A disgruntled employee stealsRead more

Kaspersky 2012 offers solid but slow protection

The bottom line: The new Kaspersky Anti-Virus for 2012 introduces a dual cloud-and-local security system bundled under an overhauled interface that's both easy to use and familiar. The suite's scans aren't the fastest, but it definitely will protect you.

Review: Kaspersky Anti-Virus continues to provide users with a high level of protection that includes security tools not offered by many competitors. The 2012 version won't change the face of personal computer security, although this particular package of security options has attracted enough devotees to make it a best-selling program, both in and out of the security … Read more

How to prevent identity theft

Somebody breaks into your e-mail account and sends phishing spam from your address to everyone in your contacts list. Somebody else steals your online bank ID and password and cleans out all the money in your accounts. And another crook swipes your Social Security number and opens credit card, cell phone, and other accounts in your name.

All three of these crimes fall under the umbrella of identity theft. Reports of declines in identity-theft incidents from such security research firms as Javelin Strategy & Research and government agencies, such as the Federal Trade Commission (FTC's consumer-complaint statistics for 2010--pdf), … Read more

Hospital scans palms to pull up medical records

A New York City hospital is using patients' palms, not insurance cards, to pull up their records, according to a new report.

The New York University Langone Medical Center started scanning palms last month to reduce paperwork and prevent identity theft, the New York Daily News reports, using a device that images the veins in a patient's hand.

Shaped like a butter tray, the black PatientSecure device uses infrared light to scan palms, then links the unique biometric trait to a patient's electronic health records.

That's right: no need to pore through a purse for an insurance … Read more

Taking the human factor out of phishing prevention

Phishing attacks are on the rise: the Anti-Phishing Work Group's April 2011 Global Phishing Survey (pdf) reports 67,677 phishing attempts in the second half of 2010, up from 48,244 in the first half of 2010, but down significantly from the 126,697 attacks recorded in the year-earlier period due to the Avalanche botnet.

Phishing attempts lasted an average of 73 hours in the last six months of 2010, up from 58 hours on average in the first half of the year, and from just under 32 hours in the second half of 2009.

When it comes to … Read more

Learning to live with the Web's insecurities

There's is no such thing as a totally safe Web service. But that doesn't mean you have to go to extremes to use Web services safely. The rules are different for businesses and families with children, who need the extra protection offered by such tools as encryption software, keystroke scramblers, and proxy services (I described the OpenDNS service in a post from May 2010).

The two pillars of PC security for every user are anti-malware software and automatic software updates. Microsoft's free Security Essentials provides real-time protection from viruses, spyware, and other unwanted software. The company's … Read more

Buzz Out Loud 1481: Worms in spaaaaace! (Podcast)

On today's show, "worms from hell" a mile or more underground. We get a look at Windows 8 and we dig it, a lot. Google says a Chinese hacker got into hundreds of Gmail accounts, which China (not surprisingly) denies. Plus, Molly gets a new boyfriend to take to the bunker (which gets grilled cheese sandwiches in addition to its chicken and Gaga), and we get schooled on matters of space shuttle transportation.

Subscribe:  iTunes (MP3)iTunes (320x180)iTunes (640x360)RSS (MP3)RSS (320x180)RSS (640x360)Read more